[oauth] To enable a provider to access consumer's resources

2009-05-28 Thread grayger

OAuth enables consumers to access providers' resources, but providers
can't access consumers' resources reversely.

We can think of scenario that a provider requests consumer's resources
even though it is not mentioned in the spec.
That enables reciprocal access.
Do you think extending the spect for the scenario is reasonable and
secure?

Regards,


--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
OAuth group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---



[oauth] ftp, ssh, scp and the like

2009-05-28 Thread Johannes Ernst
Any thoughts on how oauth could work for various command-line tools  
that today usually need a username and password?
Perhaps even the mysql client?

Or even better, anybody working on this?




Johannes Ernst
NetMesh Inc.


--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
OAuth group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---

inline: lid.gif  inline: openid.gif  http://netmesh.info/jernst





[oauth] Re: ftp, ssh, scp and the like

2009-05-28 Thread Hans Granqvist

Hi Johannes

How would you incorporate the user assent into the flow of these tools?
Seems it would be... congruent to the usage?

If you actualize authorization assent outside the authentication phase, then any
tool accessing a resource would be able to participate as long as the provider
identifies the accessor and also verifies the accessor's rights to the specific
operation on the specific resource.

Oh, that sounds complicated, but really isn't. I presented more about
this at the IIW
See more http://nocrypto.com/wiki/index.php/Authorization

Hans

On Thu, May 28, 2009 at 11:18 AM, Johannes Ernst
jernst+google@netmesh.us wrote:
 Any thoughts on how oauth could work for various command-line tools
 that today usually need a username and password?
 Perhaps even the mysql client?

 Or even better, anybody working on this?




 Johannes Ernst
 NetMesh Inc.


 


  http://netmesh.info/jernst






--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
OAuth group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---



[oauth] Re: ftp, ssh, scp and the like

2009-05-28 Thread Brian Eaton

On Thu, May 28, 2009 at 11:18 AM, Johannes Ernst
jernst+google@netmesh.us wrote:
 Any thoughts on how oauth could work for various command-line tools
 that today usually need a username and password?
 Perhaps even the mysql client?

 Or even better, anybody working on this?

Yep:
- http://sites.google.com/site/oauthgoog/UXFedLogin/desktopapps
- http://sites.google.com/site/oauthgoog/oauth-practices/auto-detecting-approval

The MySQL case is harder because OAuth assumes HTTP requests.  I know
some folks were thinking about XMPP+OAuth, anybody know what the
conclusions were?

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
OAuth group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---



[oauth] Re: ftp, ssh, scp and the like

2009-05-28 Thread Seth Fitzsimmons

 The MySQL case is harder because OAuth assumes HTTP requests.  I know
 some folks were thinking about XMPP+OAuth, anybody know what the
 conclusions were?

Yup, we cleaned up XEP-0235 (http://xmpp.org/extensions/xep-0235.html)
and it's in use within Fire Eagle.  The OAuth library for Ruby
(http://github.com/mojodna/oauth, `gem install oauth`) includes a
command-line application that will generate signatures, HTTP headers,
and XMPP stanzas in order to ease development (as well as providing a
way to initiate the authorization flow).  Switchboard
(http://github.com/mojodna/switchboard), my command-line tool for
interacting with XMPP servers, supports OAuth-signed requests as well.

The upshot (relevant for anything w/ a username/password combo) is
that we can re-use the existing authorization flow (over HTTP) to
obtain access tokens.  Once tokens have been obtained, it's up to the
application / protocol in question to define a means of using them.
At its most basic, that could mean using access tokens / secrets as
alternatives to usernames and passwords, but it could also mean
defining a protocol-specific signing mechanism (as XEP-0235 does).

seth

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
OAuth group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---



[oauth] Re: Improved User Experience for Installed Applications using OAuth

2009-05-28 Thread jr conlin

Nathan Beach wrote:
 Google has enhanced our OAuth approval flow to significantly improve 
 the user experience for installed applications that use OAuth to 
 access our GData APIs.
Perhaps I'm missing something, but doesn't this kinda saw one of the 
legs off of OAuth?

This approach basically is:  Everyone gets in using the same key, we'll 
do our best to keep users from using your app, but if they do, you'll be 
able to get their info.

We may be the off case, but we're actually kind of interested in using 
the two legged approach so that we can validate developers and grant 
some customers adjusted rates. What this approach says is There's no 
way to secure the first leg of OAuth, so we're going to ignore that. 
Frankly, it kind of makes me wonder why bother using OAuth at all? 
Couldn't you simply create a new auth protocol where an app uses https 
to connect and authorize and then stores a returned token set you can 
use to validate future requests?

It may just be that there are certain environments that one can't do 
OAuth. I'd rather that folks use a different auth mechanism for those 
than further confuse the standard.

I really don't want to be a protocol dork here, but this sets off a good 
many paranoid bells in my head.


--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
OAuth group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---



[oauth] Re: Including the signature base string in signature_invalid errors

2009-05-28 Thread John Kristian

That sounds like a fine idea, to me.  I'd prefer that the server send
the information without being asked.

We might as well follow established practice, if it works well.  What
does the Python library do, exactly?  Are there popular service
providers that do something similar?  What do they do, exactly?

By the way, what service providers have implemented the problem
reporting extension? http://wiki.oauth.net/ProblemReporting

On May 27, 12:59 am, Manish Pandit pandit.man...@gmail.com wrote:
 Do you folks think it is a good idea to include the base string/
 normalized request parameters, etc. in the signature check failure
 error message?
--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
OAuth group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---